Skip to main content

Books in Security

581-590 of 613 results in All results

Designing SQL Server 2000 Databases

  • 1st Edition
  • January 23, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 7 1 9 - 0
The Microsoft .NET initiative is the future of e-commerce - making it possible for organisations to build a secure, reliable e-commerce infrastructure. This is the first book to outline the capabilities of SQL Server 2000, one of the key components of .NET. SQL Server 2000 introduces powerful new data mining functionality designed specifically to capture and process customer profiles and to predict future buying patterns on e-commerce sites.Designing SQL Server 2000 Databases addresses the needs of IT professionals migrating from the popular SQL 7 databases to the new SQL 2000, as well as those who are starting from scratch.

Building Cisco Remote Access Networks

  • 1st Edition
  • November 15, 2000
  • Wayne Lawson
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 1 4 - 8
An increasing number of companies are designing and implementing Remote Access Networks, which allow users who are not physically connected to a Wide Area Network (WAN) or Local Area Network (LAN) to access the network's servers, applications and databases or to participate in video conferencing and conference calls. The ability for a remote user to function as if they were in the next office dramatically improves overall efficiency while reducing total cost of ownership. Cisco Systems, the world's largest internetworking vendor, is the pioneer of the enabling technologies for Remote Access Networks. This book will identify and explain all of the Cisco products necessary for designing and building a remote access network and integrating it with legacy systems.This book is a professional reference detailing all of the strategies, tactics and methods for designing, configuring and maintaining Cisco Remote Access Networks. It will include thorough discussions of all Cisco Access Servers and routers.

E-Mail Virus Protection Handbook

  • 1st Edition
  • November 6, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 7 5 3 - 4
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.

Building CISCO Networks for Windows 2000

  • 1st Edition
  • October 17, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 1 3 - 1
Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Active Directory (CNS/AD). Until now, network administrators have been forced to master two completely different product interfaces to effectively manage their networks. Configuring Cisco Network Services for Active Directory is the first book announced for this enormous Information Technology audience. This book is a practical guide to managing CNS/AD. It focuses on how to promote system efficiency and improve network service by using CNS/AD to centralize network management, using the directory as a repository for all policies that govern network usage. The book also describes how to manage Cisco Internetworking Operating System (IOS) networking features and network resources in the same unified way as other enterprise resources, such as user access controls, files, and printers.

DBAs Guide to Databases Under Linux

  • 1st Edition
  • April 26, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 0 2 9 - 1
In an effort to increase its marketshare and threat to Windows NT, Oracle8 was ported to Linux in late 1998, opening the popular database to an additional 10 million Linux users worldwide. The availability of Oracle8 enables current Linux users to deploy enterprise-class applications at low cost and provides an alternative to Microsoft Windows NT. This book covers that marriage of the most popular database and the fastest growing operating system.

Windows 2000 Configuration Wizards

  • 1st Edition
  • March 20, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 4 3 8 1 - 9
Developers are used to working with Wizards, component-like products that allow them to create certain elements - like dialog buttons - quickly and easily while they are coding applications. With the launch of Windows 2000, Microsoft has announced a new set of Wizards that will help administrators and users configure and set up Windows 2000 Professional (the Windows NT 4 Workstation successor) and Windows 2000 Server (the Windows NT 4 Server successor). Windows 2000 Setup and Configuration Wizards covers all the available Wizards, with an emphasis on those new to Windows 2000. Each Wizard is broken down by dialog box, with explanations of all options and required elements so administrators will know what to be prepared with.In addition, coverage of new services that will speed configuration and set up (like the Windows Installer) will be covered.

Physical Security 150 Things You Should Know

  • 1st Edition
  • March 8, 2000
  • Lawrence J. Fennelly + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 7 5 0 6 - 7 2 5 5 - 9
Physical Security 150 Things You Should Know is a comprehensive reference for the security professional. This book covers all aspects of security operations, from lighting and fencing to tracking systems and crime risk management. The "150 Things" offered by Tyska and Fennelly will help professionals in the field build a well-trained, alert, and conscientious security staff.

Windows 2000 Server System Administration Handbook

  • 1st Edition
  • February 16, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 7 5 - 3
Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring, and managing Microsoft products will be highly motivated to migrate to this new technology, based on its promise of reducing administrative overhead.Windows 2000 Server System Administration Handbook will help NT4 professionals to administer and support the Windows 2000 Server operating system. NT administrators will be able to differentiate the features and technology changes from Windows NT 4.0 to Windows 2000. In the handbook, readers will find a complete overview of the product, catered to their needs.

Managing Windows 2000 Network Services

  • 1st Edition
  • February 10, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 5 7 6 - 0
Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring and managing Microsoft products will be highly motivated to migrate to this new technology, based on its promise of reducing administrative overhead.Microsoft Windows 2000 Server (the predecessor to Windows NT 4 Server) integrates network services for companies and administrators to set up and manage networks, remote access and extranets, as well as to manage other communications. Managing Windows 2000 Network Services will be the first book to focus exclusively on networking and integrated voice, video, and data on networks. Readers will learn how to deploy and integrate all Windows 2000 networking technologies within an enterprise network.